Premium Essay

Cyber Security and Its Challenges to Society

In:

Submitted By abdulmajidqayyum
Words 3707
Pages 15
-------------------------------------------------
Cyber security and its challenges to society
Final Project Report

Group Members
Abdul Majid Qayyum
Umair Arshad
Hasnat Ahmed
Gulraiz Shabbir
Contents
Introduction: 3 Why is cyber security important? 4 The Impact of Cyber Security 5 The Cultural Impact 5 The Official Impact 5 The Solution Impact 5 Defining Cyber Security 6 Technology & Modern Life 6 What is Cyberspace? 6 What is Cyber Warfare? 6 Cyber is not Hype 7 What Cyber Security Isn’t 7 Cyber-crime 8 Types of Cyber-crimes 8 Hacking: 8 Theft: 8 Cyber Stalking: 9 Identity Theft: 9 Malicious Software: 9 Child soliciting and Abuse: 9 Cyber Bullying 10 Causes of Cyber-crime 10 History of Cyber-crime 10 Cyber-crime in Modern Society 11 Categories of Cyber-crime 11 Individual: 12 Property: 12 Government: 12 How to Tackle Cyber-crime 12 RECENT SURVEY ISSUES ON CYBER SECURITY TRENDS 14 Mobile Devices and Apps 14 Social Media Networking 14 Cloud Computing 14 Protect systems rather Information 15 New Platforms and Devices 15 Everything Physical can be Digital 15 Survey Questions 16 Conclusion 16

Cyber Security and its Challenges to Society
Introduction:
Over the past several years, experts and policy makers have expressed increasing concerns about protecting internet from cyber-attacks—deliberate attempts by unauthorized persons to access. Many experts expect the number and severity of cyber-attacks to increase over the next several years. The act of protecting internet, computer systems and their contents has come to be known as cyber security. Abroad and arguably somewhat fuzzy concept, cyber security can be a useful term but tends to defy precise definition. It usually refers to one or more of three things: * A set of activities and other measures intended to protect—from attack, disruption, or other threats—computers,

Similar Documents

Premium Essay

Cyber Forensics

...Computer Architectures and Their Applications (IJNCAA) 2(1): 127-137 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) Cyber Forensics: Computer Security and Incident Response Virginiah Sekgwathe1, Mohammad Talib2 1 Directorate on Corruption and Economic Crime, Gaborone, BOTSWANA veesek@gmail.com 2 Department of Computer Science, University of Botswana, BOTSWANA talib@mopipi.ub.bw ABSTRACT The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence require a well developed approach to tackle these incidents in order to realize legally defensible digital evidence. Since electronic evidence is fragile and can easily be modified, finding this data, collecting, preserving, and presenting it properly in a court of law is the real challenge. There is a need for use of semantic analysis to discover underlying security policy requirements and internal power structures and institutionalization of anti cyber attack, antimoney-laundering and regulatory schemes. The first responders to cyber security incidents often than always are an organization ICT personnel who are technically sound though may be deficient in investigative skill. The scientific standards of cyber forensics dictates the procedure as it promotes objectivity, a precise and...

Words: 5129 - Pages: 21

Premium Essay

Cyber Crime in India

...Need of Cyber Crime Law In India Abstract A Cyber space is a virtual space that has become as important as real space for business, education and politics. The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in the India. The digital age has dramatically changed the scope of a crime by adding the electronic component and it comes a new form of science ≴Computer Forensic Science≵. Computer Forensic allows for the evidence of cyber crime to be admissible in court when prosecuting the cyber criminal. In most countries, existing laws are likely to be unenforceable against such crime. Cyber laws, as it stand today, gives rise to both positive & negative consequences. The main negative consequences is the digital soup so vague that many refer to it as the dark sides of technology and that cyber criminal currently have upper hand. The applicability and effectiveness of our existing laws need to be constantly reviewed to face the risk coming from the cyber world. In this paper we are going to firstly describe the computer forensic, cyber crimes, cyber laws of nation & technology challenges. Aim of this paper is to act as a catalyst to raise awareness regarding computer forensic which continues to grow as one of the most important branch of science and help in investigation of cyber crime which continues to grow as one of the most potent threats to the Internet and computer users of the cyber society of 21st...

Words: 2686 - Pages: 11

Premium Essay

Compare and Contrast

...of Maryland University College CSIA 360 Introduction Why is it important that every nation has a cyber security strategies? The past decade multiple company national or international have faced cyber security threats. Either sensitive government information or individual’s information has been compromised. Cyber security issues have developed into a significant national level where now it requires government consideration. In this analysis we will compare Europe and the Commonwealth on how they approach the national and international cyber security strategies. Overview of national cyber security What is national cybersecurity? Well first cyber security is a body technologies, processes and practices designed to protect networks, computers, programs and data from being attacked, damaged and or unauthorized access (target, n.d.). Now in the bigger end nations are now in the need for cyber security. National cyber security is to protect publicly held information that can be personal or private, national security and more. There has been several attacks on public services that have compromised personal or private information. As technology rapidly changes, new vulnerabilities are being created. National cyber security also outlines visions and articulates priorities, principles and approaches to understanding and managing risks at the national level. Some cyber security strategies by country may focus more on protecting critical infrastructure risks, while other countries...

Words: 2800 - Pages: 12

Premium Essay

Cyber Hacking Laws In The United States

...Assignment 1: Contrast and compare the cyber hacking laws between the United States, Russian Federation, and the Peoples Republic of China Though, the fact that cyber security hacking is a widely used term, the law, punishment, rules and law are not fully developed yet. First, the cyber hacking laws in three countries are going to be reviewed. The cyber hacking laws of US is also known as “Computer Fraud and Abuse Act (CFAA) ” was released by the congress in 1986. In the documentation, it provides the laws to protect personal intellectual property on computer. Basically, it says that people should get punishment by accessing an authorized computer. Here, accessing means stealing code, command, and documents; damaging information from a...

Words: 1530 - Pages: 7

Free Essay

How Should Singapore and Other Smart Cities Deal with the Increasing Risk of Cyber Threats?

...How should Singapore and other smart cities deal with the increasing risk of cyber threats? Fifty years after its establishment, Singapore is a smart city-state success story at the forefront of a third industrial revolution. Today, the Internet of Things (IoT) increasingly interconnects Singapore’s cyber and physical systems, sensors and smart technology into the digital fabric that links society and critical infrastructures such as transportation, health, finance and defense. Infrastructure investment is expected to grow by 50% to about $30 billion by the end of the decade. But as Singapore and other smart cities become increasingly connected to cyberspace, so too does their risk of cyber threats. For the next 50 years to be as prosperous as the last, Singapore and other smart cities and nations need to develop a cyber-smart workforce, technology, policies and new risk management solutions. Cyber Smart City: Opportunity and Challenge The Cyber Smart City Opportunity of new IoT-inspired products, services and markets could boost the gross domestic product (GDP) of the world’s 20 largest economies by $14.2 trillion in 2030, according to a recent study by Accenture. This trend can be seen in Singapore’s smart buildings, where converged information and operational technologies infrastructures, control systems and sensors integrate multiple electronic systems to support building management and business functions. Smart building technology is increasing energy efficiency...

Words: 417 - Pages: 2

Premium Essay

No Paper

...ON CYBER CRIME BY ONUOHA, MAUREEN CHIZOBA C/O MR. DIKE G. OKORONKWO, PLOT 607 MONSTERRADO STREET, (NEAR RUSSEL CENTRE) WUSE ZONE 4, ABUJA, NIGERIA 2348055954286 27TH MAY, 2005 onuchizoba@yahoo.com INTRODUCTION Over the past twenty years, unscrupulous computer users have continued to use the computer to commit crimes; this has greatly fascinated people and evoked a mixed feeling of admiration and fear. This phenomenon has seen sophisticated and unprecedented increase recently and has called for quick response in providing laws that would protect the cyber space and its users. The level of sophistication has gone high to the point of using the system to commit murder and other havoc. The first recorded cyber murder committed in the United States seven years ago according to the Indian Express, January, 2002 “has to do with an underworld don in hospital to undergo a minor surgery. His rival goon hired a computer expert who altered his prescriptions through hacking the hospital’s computer system. He was administered the altered prescription by an innocent nurse, this resulted in the death of the patient”[i] This work seeks to define the concept of cyber-crime, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involvement, we would look at how best to detect a criminal mail and in conclusion, proffer recommendations that would help in checking the increasing rate of cyber-crimes...

Words: 2267 - Pages: 10

Premium Essay

Essay On Cyber Security

...Cyber security is gaining tremendous attention nowadays due to the increasing use of internet, computers by the media and various public and private institutions. They recognize the terrible impacts with the cyber attacks. Cyber security involves preventative methods which are used to protect information from being stolen or attacked. Cyber attack is a crime that involves a computer and a network for stealing and attacking of information. It is an attack where a person uses a computer to commit an illegal act. At present, cyber attacks is the current challenging issue which has resulted in computer based criminal activities which are generating worldwide threat, destruction and disruption. There is no border for cyber activities. The increase in the use of internet by the world wide users and lack of international cyber...

Words: 2239 - Pages: 9

Premium Essay

Cyber Security in the Usa

...Cyber Security in the USA In this current age, computers and online connectivity have become a common ground for the majority of people living in America. Emails, instant messengers and social media are phasing out hand written letters. Physical salary checks, bills and bank statements are available online and the majority of these services communicate with each other for a more convenient experience to the users. With the rapid growth of technology additionally comes growing concerns of this nation’s ability to defend itself from attacks. It is extremely important to keep security in mind while actively utilizing the many features of the cyber world. There are many malicious software and people online that send out numerous threats every day. Therefore, because of the amount of connectivity and information being shared online, cyber security is one of the most significant issues facing America today and moving into the future. Cyber Security involves a numerous amount of steps, one of the most important being a person’s ability to understand the different types of attacks that they are liable to encounter. The implementation of computers in the classroom has grown significantly over the years. According to University of South Florida, one computer classrooms will face more challenges than a class with several computers. Classrooms with laptops and wireless network connectivity yield the best results. Students can take them on field trips, bring them home for assignments outside...

Words: 366 - Pages: 2

Premium Essay

Cyber Security Act

...Lodhi Road New Delhi – 110003 Discussion draft on National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Your comments/feedback on this document are most welcome. Please send your valuable comments/feedback by 15 May 2011 to Dr Gulshan Rai, Director General, CERT-In, at the at the above address or on email id ‘grai@mit.gov.in’ Discussion draft Department Of Information Technology National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Contents 1.0 Security of Cyber Space – Strategic perspective 1.1 IT as an engine for economic growth and prosperity 1.2 Security of cyber space - Need for action 1.3 Target audience 1.4 Securing cyber space – Key policy considerations 2.0 Cyber space – Nature of threat 2.1 Threat landscape 2.2 International cooperation 2.3 Securing cyber space – Scope of action 2.3.1 Cyber security and cyber defense 2.3.2 Cyber intelligence and cyber defense 2.4 Priorities for action 2.5 Partnership and collaborative efforts 3.0 Enabling processes 3.1 Security threat and vulnerability management 3.2 Security threat early warning and response 3.3 Security best practices - compliance and assurance 3.4 Security crisis management plan for countering cyber attacks and cyber terrorism 3.5 Security legal framework and law enforcement 3.6 Security information sharing and cooperation 4.0 Enabling technologies – Deployment...

Words: 7888 - Pages: 32

Premium Essay

Presidential Powers

...and balances imposed by the constitution. The president will have to be put into a bill which must be passed by Congress. One of the bills in the Congress debate timeline is Cyber security bill. In my opinion, the Congress should pass the President's Cyber security proposal. The bill protects American citizens in various ways. It proposes to centralize reporting of breach data nationally (Burns 2012). This is a win-win game between clients and investors. This is because the proposal compels entities to show information to consumers incase their personal information is accessed illegally. Thus, businesses are incentives to incorporate better cyber security. Also, it helps consumers to be vigilant on their identity theft. The proposal also puts cyber crime in the realm of other types of crimes and spell penalties to the culprits. This will help law enforcers in fighting organized cyber crime which is prevalent in the current computer world (Thomas 2013). Thus, the American people are protected from cyber fraudsters who siphon their huge possessions. The proposal also protects critical national Information Technology infrastructure. This is by giving US government statutory authority to aid organizations that suffer cyber intrusion damages. It mandates DHS to offer oversight role on cyber practices on behalf of the government (Thomas 2013). This tech-body monitors and protects delicate computer infrastructure which is very prone to attack....

Words: 979 - Pages: 4

Premium Essay

Trend Analysis of Wechat Payment Function

...Assignment 2A provides a preliminary overview for your Business Proposal (Assignment 2B). In this assignment, you are to identify current trends in the market and/or in the society in relation to your topic. To identify these trends, you will investigate the current industry landscape (consider relevant political, economic, social/psychological/behavioural, and technological factors) via secondary research (scholarly articles, business reports and databases). You are expected to present three trends to your manager by synthesising information from four sources. These trends may provide opportunities for your company to capitalise on, or reveal threats that could harm your company’s bottom line (economic, social or environmental). Therefore, this overview will be helpful for your company to decide the next course of action to address these trends so as to bring benefits to the company. That is to say, the focus of Assignment 2A is to give your manager or a decision maker in your department an overview of trends that is valid, accurate and relevant to the company based on your chosen topic. Note that in reviewing the trends, you should be aware of your audience’s needs and expectations (perform an audience analysis before writing your overview of trends). Synthesis matrix SWOT analysis Company profile (vision, mission, values) * Company choice: (Tencent --- wechat) Mission: To enhance people's quality of life through Internet services. * Treat the Internet like...

Words: 674 - Pages: 3

Premium Essay

Essay On Cyber Law

...routine of work and daily life. However, the use of computers will lead to the cybercrime. Cybercrime can be relate to the computers, IT and the Internet technology. Cyber world is known for its unlimited space and boundaries. Talk about cyber world, it is must have a violation that we will face it. Consequently in our country, cyber world become an ocean of information that enables people to share, communicate, and make business, making friends including creating opportunities to commit crimes and taking advantage of people openness in sharing data and information about themselves by those predators looking for victims in the cyber world. Regulating behaviour is never easy despite the existence of laws and regulations and one of the most difficult challenges is that technology are often too fast developed for the law to catch up. VIOLATION OF THE CYBERLAWS AND COMPUTER ETHICS Talk about available laws, have a lot of violation that will impact to us in our daily life...

Words: 1117 - Pages: 5

Premium Essay

Cyber Crime Team

...Cyber-Crime Article Analysis Team D June 12, 2013 CJA/394 Cyber-Crime Article Analysis Cyber-crime is an increasing type of crime locally and globally. Cyber-crime is defined as, “criminal activity or a crime that involves the Internet, a computer system, or computer technology,” ("Cyber-crime," 2012). Law enforcement, courts, and corrections are affected in different ways by cyber-crimes. Law enforcement faces issues with cyber-crime, such as privacy, confidentiality, determining the location the crime initiated, and locating the perpetrator(s). Courts face issues, such as loss of evidence and loop holes in laws. Correctional facilities face internal cyber-crimes and overcrowding as a result of cyber-crimes. The following information will discuss the issues within each division of the criminal justice system and provide remedy recommendations. The information will conclude with an analysis of global crime. Cyber-crime and Law Enforcement Cyber crime has made a major impact on the law enforcement it has not only given them more things to have to worry about but also has helped them to solve and organize crime better. The internet has changed so many things about this world, from how we purchase things, how we keep in touch with one another, and of course how some can conduct crime. Not only can a criminal stalk someone, but they can also stalk that person’s child, especially at sites like Face Book. A Hacker...

Words: 1524 - Pages: 7

Premium Essay

Evaluation of the Global Impact of the Estonia Cyber Event

...IA1 – EVALUATION OF THE GLOBAL IMPACT OF THE ESTONIA CYBER EVENT Sherquita Tucker CSEC655 Section 9041 Table of Contents 1. Introduction 3 2. Background and Global Impact 4 3. Vulnerabilities in Cybersecurity Policy and Practices 5 4. Advantages of Reducing Vulnerabilities for Future Attacks 8 5. Disadvantages of Reducing Vulnerabilities for Future Attacks 8 6. Advantages of Improving Security Practices or Policies 9 7. Disadvantages of Improving Security Practices or Policies 10 8. Summary and Conclusion 12 References 14 IA1 – Evaluation of the Global Impact of the Estonia Cyber Event 1. Introduction What if suddenly the safety systems of nuclear power plants unexpectedly malfunctioned, or suddenly floods of water was released atop a neighboring community due to a malfunctioning of the control systems of a major dam, or air traffic control systems of major airports was to suddenly render inoperable, or business transactions of stock exchanges or major banks stopped or vanished ? Even worse, what if it all occurred instantaneously? Would this be an idea behind a new movie thriller, or the realism of cyber war in the twenty-first century? The notation of the using computing and networking systems as an alternative method to the traditional terrorist attacks has always been a major concern. In the early 1990s, since the public debut of the Internet, not all consumers have used cyberspace with peaceful intent. This is particularly...

Words: 3346 - Pages: 14

Free Essay

Cyber Terrorism

...12/31/13 Cyber Terroism Cyber terrorism is a combination of two terms Cyber and terrorism. The word "Cyber" is derived from "cybernetic", a word from Greek "kybernetes", meaning "To steer" and the term "terrorism" comes from French terrorisme, from Latin word 'terror', "great fear", "dread", related to the Latin verb terrere, "to frighten". Cyber terrorism denotes unlawful attacks and threats of attack against computers, networks and information stored therein to intimidate or coerce a government or its people for propagating hidden political or unlawful social and religious agendas. These attacks result in violence against persons or property or cause public unrest. Few examples could be explosions, plane crashes and severe losses. Terrorists are known to use internet to prepare the schemes, raise funds and spread cyber terrorism. For instance, Razmi Yousef who was a key person behind World Trade Centre attack had details schemes to destroy United States airliners encrypted files in his laptop computer. We know that Cyber terrorism is the crime that has emerged in recent times, to use the medium of Internet to terrorize the minds of citizens. Admirably, the Laws through the implementation of the Information technology Act, 2000, is one of the efficient steps taken towards the creation of punishment of these kinds of crimes. There is need of innovative laws and global standards on preventive action. The Indian Information Technology Amendment Act 2008 lays down Section 66F...

Words: 4466 - Pages: 18